-
1
-
-
70449691521
-
-
eMule forum :: Fake Server List And Ip Numbers. http://forum. emuleproject. net/index.php?showtopic=120066.
-
eMule forum :: Fake Server List And Ip Numbers. http://forum. emuleproject. net/index.php?showtopic=120066.
-
-
-
-
2
-
-
70449696028
-
-
eMule forum: Repeated Kad Errors. http://forum.emuleproject. net/index.php?showtopic=133799.
-
eMule forum: Repeated Kad Errors. http://forum.emuleproject. net/index.php?showtopic=133799.
-
-
-
-
3
-
-
84872710807
-
-
I-BlockList. http://www.IBlocklist.com.
-
I-BlockList
-
-
-
4
-
-
70449664335
-
-
Is the Skype outage really a big deal? http://news.cnet.com/8301-10784-3- 9761673-7.html.
-
Is the Skype outage really a big deal? http://news.cnet.com/8301-10784-3- 9761673-7.html.
-
-
-
-
5
-
-
40849119671
-
The P2P war: Someone is monitoring your activities
-
A. Banerjee, M. Faloutsos, and L. Bhuyan. The P2P war: Someone is monitoring your activities. In ScienceDirect, pages 1272-1280, 2008.
-
(2008)
ScienceDirect
, pp. 1272-1280
-
-
Banerjee, A.1
Faloutsos, M.2
Bhuyan, L.3
-
6
-
-
84869664065
-
-
Adunanza. http://www.adunanza.net/.
-
Adunanza
-
-
-
7
-
-
60649112960
-
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
-
E. Athanasopoulos, K.G.Anagnostakis, and E. Markatos. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In ACNS, 2006.
-
(2006)
ACNS
-
-
Athanasopoulos, E.1
Anagnostakis, K.G.2
Markatos, E.3
-
8
-
-
0141427794
-
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, 2002.
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, 2002.
-
-
-
-
12
-
-
84871950357
-
-
BitTorrent. http://www.bittorrent.org.
-
BitTorrent
-
-
-
13
-
-
33847636533
-
The Impact and Implications of the Growth in Residential User-to-User Traffic
-
K. Cho, K. Fukuda, and H. Esaki. The Impact and Implications of the Growth in Residential User-to-User Traffic. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Cho, K.1
Fukuda, K.2
Esaki, H.3
-
14
-
-
56449096542
-
-
CISCO
-
CISCO. Cisco IOS NetFlow. http://www.cisco.com/web/go/netflow.
-
Cisco IOS NetFlow
-
-
-
15
-
-
44449130555
-
Finding Peer-To-Peer File-sharing Using Coarse Network Behaviors
-
M. Collins and M. Reiter. Finding Peer-To-Peer File-sharing Using Coarse Network Behaviors. In ESORICS, 2006.
-
(2006)
ESORICS
-
-
Collins, M.1
Reiter, M.2
-
16
-
-
34247229209
-
-
F. Constantinou and P. Mavrommatis. Identifying Known and Unknown Peer-to-Peer Traffic. In NCA, 2006.
-
F. Constantinou and P. Mavrommatis. Identifying Known and Unknown Peer-to-Peer Traffic. In NCA, 2006.
-
-
-
-
17
-
-
70449691520
-
-
DC++. http://dcplusplus.sourceforge.net/.
-
DC++. http://dcplusplus.sourceforge.net/.
-
-
-
-
18
-
-
84876215464
-
BotTorrent: Misusing BitTorrent to launch DDoS attacks
-
K. Defrawy, M. Gjoka, and A. Markopoulou. "BotTorrent: Misusing BitTorrent to launch DDoS attacks". In SRUTI, 2007.
-
(2007)
SRUTI
-
-
Defrawy, K.1
Gjoka, M.2
Markopoulou, A.3
-
19
-
-
70449660997
-
-
eMule. http://www.emule-project.net.
-
eMule. http://www.emule-project.net.
-
-
-
-
20
-
-
45749146270
-
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
-
M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In KDD-96, 1996.
-
(1996)
KDD-96
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
21
-
-
70449694488
-
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese. Network Monitoring using Traffic Dispersion Graphs (TDGs). In IMC, 2007.
-
Network Monitoring using Traffic Dispersion Graphs (TDGs)
, vol.1097
, pp. 2007
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
22
-
-
70449681878
-
-
IPP2P. http://www.ipp2p.org.
-
IPP2P. http://www.ipp2p.org.
-
-
-
-
23
-
-
14944345677
-
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy. Transport Layer Identification of P2P traffic. In IMC, 2004.
-
Transport Layer Identification of P2P traffic
, vol.1097
, pp. 2004
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
25
-
-
14944367082
-
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen. Sketch-based change detection: Methods, evaluation, and applications. In IMC, 2003.
-
Sketch-based change detection: Methods, evaluation, and applications
, vol.1097
, pp. 2003
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
26
-
-
33746603312
-
Mining Anomalies Using Traffic Feature Distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. In SIGCOMM, 2005.
-
(2005)
SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
27
-
-
2442421260
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Maymounkov, P.1
Mazieres, D.2
-
28
-
-
9544246743
-
Measuring IP and TCP behavior on edge nodes with Tstat
-
M. Mellia, R. L. Cigno, and F. Neri. Measuring IP and TCP behavior on edge nodes with Tstat. Computer Networks, 47(1):1-21, 2005.
-
(2005)
Computer Networks
, vol.47
, Issue.1
, pp. 1-21
-
-
Mellia, M.1
Cigno, R.L.2
Neri, F.3
-
29
-
-
14344265818
-
Internet Traffic Classification Using Bayesian Analysis Techniques
-
A. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In SIGMETRICS, 2005.
-
(2005)
SIGMETRICS
-
-
Moore, A.1
Zuev, D.2
-
32
-
-
84869687767
-
-
Prolexic. http://www.prolexic.com/content/moduleId/tPjJLKRF/ article/aRQNVcBH.html.
-
Prolexic
-
-
-
33
-
-
70449647203
-
-
J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. Simple Traversal of User Datagram Protocol Through Network Address Translation STUN, 2003. RFC-3489.
-
J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy. Simple Traversal of User Datagram Protocol Through Network Address Translation STUN, 2003. RFC-3489.
-
-
-
-
35
-
-
84878704906
-
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan. Network anomography. In IMC, 2005.
-
Network anomography
, vol.1097
, pp. 2005
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
-
36
-
-
36249028929
-
A Measurement Study of the Structured Overlay Network in P2P File-Sharing Applications
-
M. Zhou, Y. Dai, and X. Li. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Applications. In ISM, 2006.
-
(2006)
In ISM
-
-
Zhou, M.1
Dai, Y.2
Li, X.3
|